Rajiv Thummala (Sibley School of MAE, Cornell University), Eric Race (Jet Propulsion Laboratory, California Institute of Technology), Gregory Falco (Sibley School of MAE, Cornell University)

As space systems become critical infrastructure, they have attracted increasing attention from the cybersecurity community. This paper argues that securing spacecraft requires a mission-centric cybersecurity paradigm that treats mission continuity and availability as first-order design and security primitives, rather than adapting practices from terrestrial systems. We identify seven constraints that shape the space security problem: mission-specific designs that prevent standardization, physics that couples software to irreversible orbital dynamics, permanent loss of hardware access after launch, communication gaps that mandate autonomous decisions, environmental degradation of electronics, tight subsystem dependencies that enable cascading failures, and governance pressures that constrain feasible security architectures. None of these dimensions is unique in isolation, but their simultaneous presence and coupling produces a distinct security problem and design space.

View More Papers

Building Next-Generation Datasets for Provenance-Based Intrusion Detection

Qizhi Cai (Zhejiang University), Lingzhi Wang (Northwestern University), Yao Zhu (Zhejiang University), Zhipeng Chen (Zhejiang University), Xiangmin Shen (Hofstra University), Zhenyuan Li (Zhejiang University)

Read More

MVP-ORAM: a Wait-free Concurrent ORAM for Confidential BFT Storage

Robin Vassantlal (LASIGE, Faculdade de Ciências, Universidade de Lisboa, Portugal), Hasan Heydari (LASIGE, Faculdade de Ciências, Universidade de Lisboa, Portugal), Bernardo Ferreira (LASIGE, Faculdade de Ciências, Universidade de Lisboa, Portugal), Alysson Bessani (LASIGE, Faculdade de Ciências, Universidade de Lisboa, Portugal)

Read More

Faster Than Ever: A New Lightweight Private Set Intersection...

Guowei Ling (Shanghai Jiaotong University), Peng Tang (Shanghai Jiao Tong University), Jinyong Shan (Beijing Smartchip Microelectronics Technology Co., Ltd.), Liyao Xiang (Shanghai Jiao Tong University), Weidong Qiu (School of Cyber Science and Engineering, Shanghai Jiao Tong University, China)

Read More